Mon.Apr 29, 2024

article thumbnail

Secure by Design: UK Enforces IoT Device Cybersecurity Rules

Data Breach Today

Law Bans Universal Default Passwords; Requires Bug-Reporting Channels, Update Plan Say goodbye to buying internet of things devices in Britain with a default or hardcoded password set to "12345," as the country has banned manufacturers from shipping internet-connected and network-connected devices that don't comply with minimum cybersecurity standards.

article thumbnail

FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data

Krebs on Security

The U.S. Federal Communications Commission (FCC) today levied fines totaling nearly $200 million against the four major carriers — including AT&T , Sprint , T-Mobile and Verizon — for illegally sharing access to customers’ location information without consent. The fines mark the culmination of a more than four-year investigation into the actions of the major carriers.

Access 271
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pyongyang Hackers Deploy Backdoors Via Fake Job Interviews

Data Breach Today

North Korean Prediliction for Elaborate Social Engineering Attacks Strikes Again Likely North Korean threat actors are using fake job interviews to trick software developers into downloading disguised Python backdoors as part of an ongoing espionage campaign. Pyongyang hackers have a history of constructing elaborate social engineering ruses.

269
269
article thumbnail

The Los Angeles County Department of Health Services disclosed a data breach

Security Affairs

The Los Angeles County Department of Health Services reported a data breach that exposed thousands of patients’ personal and health information. The Los Angeles County Department of Health Services disclosed a data breach that impacted thousands of patients. Patients’ personal and health information was exposed after a phishing attack impacted over two dozen employees.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Why Many Healthcare Sector Entities End Up Paying Ransoms

Data Breach Today

While most healthcare sector organizations hit with ransomware attacks never imagine giving in to extortion demands, the pressures they face in dealing with the crisis often push about half of them to pay, said attorney Lynn Sessions of BakerHostetler, speaking about the firm's healthcare clients.

More Trending

article thumbnail

Career Spotlight: Growing Need for Technology Legal Analysts

Data Breach Today

High Demand for Experts Who Know Law Plus AI, Blockchain and Internet of Things Advancements in AI, blockchain and the internet of things have caused the demand for professionals who have expertise in those fields as well as in law to skyrocket. There simply are not enough experts equipped with this knowledge, and the gap presents a unique and lucrative career opportunity.

article thumbnail

A New Wave of Class Actions: The Genetic Information Privacy Act

Data Matters

Largely dormant for the last 25 years, Illinois’ Genetic Information Privacy Act (GIPA) has been sharing the limelight recently with its sibling, the Biometric Information Privacy Act. (BIPA). GIPA includes a number of restrictions related to the use and disclosure of genetic testing and genetic information, and it provides a private right of action and permits recovery of steep statutory damages.

Privacy 88
article thumbnail

French Government Bids on Atos' Cyber and Computing Assets

Data Breach Today

Atos Received a Letter of Intent From French Finance Minister Bruno Le Maire The French government could acquire a loss-making cybersecurity unit and other critical assets of Paris IT consultancy firm Atos after previous bids by competing firms fell through. Atos employs about 4,000 people and is strategically important to the French government.

article thumbnail

Google prevented 2.28 million policy-violating apps from being published on Google Play in 2023

Security Affairs

Google announced they have prevented 2.28 million policy-violating apps from being published in the official Google Play. Google announced that in 2023, they have prevented 2.28 million policy-violating apps from being published on Google Play. This amazing result was possible thanks to the introduction of enhanced security features, policy updates, and advanced machine learning and app review processes.

Privacy 99
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Are Enterprises Overconfident About Cybersecurity Readiness?

Data Breach Today

Cisco Cybersecurity Readiness Index Shows Only 3% of Companies Are Cyber Resilient Cisco's 2024 Cybersecurity Readiness Index showed a concerning gap - while 80% of organizations felt confident in their cybersecurity readiness, only 3% had a "Mature" level of readiness. This suggests companies must plan cybersecurity budgets, upgrade infrastructure and adopt AI for resilience.

article thumbnail

Choosing the right solution for end-to-end process optimization 

CGI

Through digital technology, financial institutions, including banks and insurers, can streamline, optimize, and integrate their back- and front-end business processes across the enterprise to improve efficiencies, the customer experience, and more. The question is which solution is best for achieving this?

article thumbnail

Forescout CEO on Navigating OT, IoT Threats in Cybersecurity

Data Breach Today

Barry Mainz Discusses Asset Visibility, Security and Risk Management Outside IT Forescout CEO Barry Mainz highlights the growing risks associated with OT and IoT devices and how cybersecurity strategies must evolve to address these challenges. He emphasizes the need for visibility, classification and robust risk assessment to manage these vulnerabilities effectively.

IoT 152
article thumbnail

The FCC imposes $200 million in fines on four US carriers for unlawfully sharing user location data

Security Affairs

The Federal Communications Commission (FCC) fined the largest U.S. wireless carriers $200 million for sharing customers’ real-time location data without consent. The FCC has fined four major U.S. wireless carriers nearly $200 million for unlawfully selling access to real-time location data of their customers without consent. The fines come as a result of the Notices of Apparent Liability (NAL) issued by the FCC against AT&T, Sprint, T-Mobile, and Verizon in February 2020.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

How the Enterprise Browser Has Reshaped the Modern Workplace

Data Breach Today

Island CEO Mike Fey on How Enterprise Browsers Streamline Operations, Fuel Security Island co-founder and CEO Mike Fey discusses how enterprise browsers facilitate efficient business processes through cloud integrations, safeguard sensitive data effectively and deliver a user experience tailored to the needs of business environments.

Cloud 152
article thumbnail

Whale Song Code

Schneier on Security

During the Cold War, the US Navy tried to make a secret code out of whale song. The basic plan was to develop coded messages from recordings of whales, dolphins, sea lions, and seals. The submarine would broadcast the noises and a computer—the Combo Signal Recognizer (CSR)—would detect the specific patterns and decode them on the other end.

article thumbnail

FCC Fines US Cell Carriers $200M for Selling Location Data

Data Breach Today

Commission Approves Long-Anticipated Fines for Verizon, T-Mobile, AT&T and Sprint The Federal Communications Commission announced Monday that it is slapping the leading U.S. cellular providers with nearly $200 million in fines for selling customers' location data to third parties without their consent, following years of warnings from lawmakers about the apparent privacy abuses.

article thumbnail

Vulnerability Recap 4/29/24 – Cisco, Microsoft, Palo Alto & More

eSecurity Planet

Many of this week’s disclosures involve new aspects of old vulnerabilities. Palo Alto’s Pan-OS flaw impacts Siemens products and receives new remediation instructions. An old Microsoft Windows spooler flaw is added to the CISA KEV list, and the Cactus Ransomware gang currently pursues unfixed Qlik Sense servers with a vulnerability patched in September 2023.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Targeted Smishing Attacks by Threat Group “The Com” On The Rise

KnowBe4

The activity by this group, responsible for (SIM) swapping, cryptocurrency theft, swatting, and corporate intrusions is on the rise, according to new.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Thales Cloud Protection & Licensing

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders madhav Tue, 04/30/2024 - 05:32 Trust is the currency of the digital economy. It fuels innovation, drives customer loyalty, and underpins successful digital transformation. The Thales 2024 Trust Index report indicates that 87% of consumers expect vendors to respect their digital rights, which leads to trusted relationships.

article thumbnail

The Art of Huh?

KnowBe4

One of the best things you can teach yourself, your family, and your organization is how to recognize the common signs of phishing and how to mitigate and appropriately report it.

article thumbnail

WASHINGTON DC METRO AREA CHAPTERS OF ARMA INTERNATIONAL: BRAVE NEW WORLD OF FEDERAL RECORDS on May 14, 2024 8:30am-4pm

IG Guru

Register here. The post WASHINGTON DC METRO AREA CHAPTERS OF ARMA INTERNATIONAL: BRAVE NEW WORLD OF FEDERAL RECORDS on May 14, 2024 8:30am-4pm first appeared on IG GURU.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Phishing Campaigns Spoof the U.S. Postal Service

KnowBe4

Researchers at Akamai have found that phishing sites impersonating the U.S. Postal Service get as much traffic as the real USPS website.

article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

Integrated risk management (IRM) is a discipline designed to embed risk considerations for the use of technology throughout an organization. In other words, it links technology spending directly to the value of the resource protected and the associated risks controlled by that technology. To explain IRM, in the article I outline its key components, benefits, how IRM differs from other risk models, and IRM frameworks.

Risk 67
article thumbnail

Your KnowBe4 Compliance Plus Fresh Content Updates from April 2024

KnowBe4

Check out the April updates in Compliance Plus so you can stay on top of featured compliance training content.

article thumbnail

VeloxCon 2024: Innovation in data management

IBM Big Data Hub

VeloxCon 2024 , the premier developer conference that is dedicated to the Velox open-source project, brought together industry leaders, engineers, and enthusiasts to explore the latest advancements and collaborative efforts shaping the future of data management. Hosted by IBM® in partnership with Meta, VeloxCon showcased the latest innovation in Velox including project roadmap, Prestissimo (Presto-on-Velox), Gluten (Spark-on-Velox), hardware acceleration, and much more.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Rethinking Supply Chains at the Gartner Supply Chain Symposium Xpo, Orlando

OpenText Information Management

I will be attending the Gartner Supply Chain Symposium Xpo, Rethinking Supply Chains, in Orlando in a few days. This conference runs May 6-8, 2024, and OpenText has participated in this conference in the past, both in Orlando and its sister event in Europe, usually taking place a month later. Both of these leading events bring together supply chain leaders from around the world and from various industry sectors to discuss key trends impacting their operations and to learn from each other how to

IoT 57
article thumbnail

Teqtivity + Jamf Pro: Maximizing benefits for your Apple fleet

Jamf

Businesses face myriad challenges to security and compliance. Learn how the seamless integration between Teqtivity and Jamf Pro offers unparalleled advantages for managing your Apple fleet.

article thumbnail

Db2 13 for z/OS: Utility Execution History

Robert's Db2

A few months ago, I got this question from a Db2 for z/OS DBA: "Is there a way we can check to see if the UNLOAD utility has been executed for certain of our tables?" The environment in question was a Db2 12 for z/OS system, and because of that I had to provide an answer that was less-than-great from an ease-of-use persepective: "Yes, you can do that in a Db2 12 environment, but the process is going to be a bit cumbersome.

IT 62